snync
v1.3.4
Published
Mitigate security concerns of Dependency Confusion supply chain security risks
Downloads
974
Maintainers
Readme
About
Prevent and detect if you're vulnerable to Dependency Confusion supply chain security attacks
Intro
When you manage private open source packages, for reasons such as keeping intellectual property private, then these packages will be hosted and served via private registries, or require authorization. By definition, these packages won't exist on public registries. However, when a package name is used without a reserved namespace (also known as a scope in npm, for example), they are often free to be registered by any other user on the Internet and create a potential Dependency Confusion attack vector. The attack manifests due to a mix of user misconfiguration, and bad design of package managers, which will cause the download of the package from the public registry, instead of the private registry.
How does it work?
This tool detects two types of potential Dependency Confusion compromises:
- Vulnerable
- Suspicious
Vulnerable
A case of actual vulnerable package is when a package name is detected to be used in a project, but the same package name is not registered on the public registry.
You can easily simulate a real world example of this case in an npm project:
- Edit the package.json file
- Add to the
dependencies
key a new entry:"snyk-private-internal-logic": "1.0.0"
and save the file (this assumes the package namesnyk-private-internal-logic
is not registered on npmjs.org). - Commit the file to the repository
- Run
snync
to detect it.
When a package is detected as vulnerable, it is our recommendation to immediately reserve the name on the public registry.
Suspicious
What happens if the private package name that you use is already registered on the public registry as a functional and unrelated package by someone else? In this case, you don't own the public package, but someone else does. Theoretically, this might not look as a problem because in a dependency confusion case the worst thing that can happen is the wrong package to be installed. However, that diminishes the potential threat model where a package can be hijacked and replaced by malicious versions of it, especially in cases of low-downloaded and unmaintained packages.
We've seen cases of package hijacking and maintainer accounts compromises in past supply chain security incidents such as event-stream
, mailparser
, and eslint-config
as some examples of highly downloaded packages, and very active maintainers, yet still resulting in package compromises.
When a pakcage is detected as suspicious, it is our recommendation to immediately move to a new package naming and reserve that new name on the public registry.
Logic flow
How does snync work from decision tree perspective?
1. Get "all dependencies" in `package.json` (note, refers to direct dependencies only, not transitive)
['dependencies'] and ['devDependencies]
2. If a package includes a scope (such as prefixed with a `@snyk/`)
then remove it from the "all dependencies" list and save it for later, to warn the user to ensure they own that scope
3. Foreach of the "all dependencies" gathered, get the time it was introduced to the source-code (i.e. the time it was added to `package.json`)
4. Foreach of the "all dependencies" gathered, get the time it was created in the npmjs registry
5. Compare the two timestamps
5.1. if a package is not found in the registry then signal an error to let them know that this public namespace is not taken, and is vulnerable for someone to employ a Dependency Confusion on them.
5.2. if a package is found in the registry, and it was created after the time it was introduced to source-code, then signal a warning that there is potentially an attack in progress and to warn the user to review the premise and legitimacy of that package that exits in the public registry.
Supported ecosystems
| Ecosystem | Supported
| ------------- | -------------
| npm | ✅
| pypi |
Install
Prerequisite
To use this tool, it is expected that you have the following available in your environment:
- Node.js and npm in stable and recent versions
- The Git binary available in your path
npm install -g snync
Usage
To scan a project's dependencies and test if you're vulnerable to Dependency Confusion security issues, where the project's git repository is cloned at /home/user/my-app
:
npx snync --directory /home/user/my-app
Implementation details
To get a list of dependencies we parse a project's manifest (package.json
) from the root of the directory you specify as a first argument.
Then we fetch from the public NPM registry to check when each dependency was created. At this point we can check if dependency is vulnerable – if it is not in the public NPM registry.
To check if dependency is suspicious we compare date it was first introduced to a project's manifest and date it was published. To understand when you added a dependency to a manifest we scan git commits history.
FAQ
Q. Why is it called snync? A. snync is abbreviation for So Now You're Not Confused, which is a play on Snyk's So Now You Know.